👤 OSINT. Search for a target by username.

• You've probably already encountered a service for finding a target using the username "whatsmyname", and if you haven't, be sure to pay attention. Recently, this resource has been updated and now we can search for information on the username on 576 popular sites. There is also an opportunity to search through the list of usernames, rather than going through the information for each individual query and re-perform the search.

🗞 The Privacy, Security, & OSINT Magazine.

• This month, the fifth issue of the magazine "UNREDACTED Magazine", authored by Michael Bazzell, appeared online.

Symantec researchers report details about the activities of a cybercrime group they track as Bluebottle, revealing significant similarities to the TTP gang OPERA1ER.

As the researchers found out, Bluebottle hackers used a signed Windows driver to attack banks in French-speaking countries. At the same time, the actions and goals correspond to the OPERA1ER profile, which were attributed to at least 35 successful attacks in the period from 2018 to 2020.

🫠 Social Engineering. MFA-fatigue (MFA Fatigue).


• MFA Fatigue is one of the social engineering methods used by attackers to bypass multi—factor authentication, causing an endless stream of push requests sent to the account owner's mobile device. If the victim accepts the request, the attacker will successfully complete the authorization.

👨🏻‍💻 A complete guide to attacks on Internet of Things devices.

• Internet connection gives many of the home devices new useful features, but security in the IoT world often works on the principle of "come in who wants, take what you want."

 

🔄 Reverse search. Methods of searching for information on images and auxiliary tools.

• If we are faced with the task of identifying a person or object from a photograph, then we can solve it using various methods and auxiliary tools.

👨🏻‍💻 Mimikatz. Application guide.

• Benjamin Delpy originally created Mimikatz as a proof of concept to demonstrate to Microsoft the vulnerability to attacks of their authentication protocols. Instead, he inadvertently created one of the most widely used and downloaded hacking tools in the last 20 years.

🔖 S.E. Note. Mind Maps for every taste.

• A collection of various MindMaps for Pentesters, Information Security specialists and Bug Bounty Hunters. The cards will help in learning new material or when performing certain work / tasks. Add to bookmarks:

🕵️‍♂️ OSINT. Useful resources from cyb_detective.

• There are a lot of significant specialists and enthusiasts in the field of #OSINT, one of them is @cyb_detective, which maintains and constantly keeps up-to-date various lists with useful tools, resources and other necessary information for everyone interested in the OSINT topic.

Social Engineering: registration for a hundred bucks.

• A fan of the TV series "Breaking Bad" created 20 phishing darknet marketplaces and charged gullible "hackers" 100 bucks for registration.

👨🏻‍💻 Awesome Memory Forensics.

The main task in digital forensics is to collect information, namely, to obtain images of hard drives, RAM and network connection dumps.

 

Monitoring the brand mention 

Do you want to know the coverage of a particular brand? DataLocator is an artificial intelligence that collects and processes information online. 

We collect sites, focusing on the main thing

Docusaurus will help you create a first-class documentation site in the shortest possible time.

We distribute tasks by time

A really serious product from serious people. The project was created together with the studio of Artemy Lebedev.

Let's find out who called us

I wonder who it was? Now let's try to figure it out.

Site Search

Site Menu


☑ Websites Scripts

Calendar

«    November 2024    »
MonTueWedThuFriSatSun
 123
45678910
11121314151617
18192021222324
252627282930 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +16 Total articles 6747
  • +14 Comments 4077
  • +24 Users : 5841